Previous post
Posted on: 6 February 2023
Author: Karen Rogers
Essentially, an endpoint is a physical device that connects to and exchanges information with a computer network and endpoint protection prevents these endpoints from being breached. This includes computers, mobile devices, servers, and smart gadgets. Endpoints make up the majority of a company’s IT infrastructure and network.
Ultimately, the amount of endpoints your company has will be dependent on your business side but to put it into perspective:
With each of these devices, there is an opportunity for hackers to attempt to get past a company’s defences. There is potential for hackers to cause havoc, from planting malware or getting access to sensitive company data. Having a strategy in place for endpoint security Is essential to reducing risk and having direct tactics in place.
It has been found that 68% of organisations have experienced one or more endpoint attacks and Corbel don’t want you to be a part of this percentage. That is why in this guide we have provided you with simple solutions which are focused on the protection of endpoint devices to protect your organisation.
When it comes to endpoint and your endpoint protection, devices, passwords are one of the biggest vulnerabilities. Surprisingly lots of large data breaches are related to something as simple as leaked passwords.
One of the biggest dangers to Cyber Security is poor password security as it just makes credential theft that little bit easier. Ways for you to ensure your password security is up to scratch include:
To check the strength of your current password or to generate a strong password, take a look out our free password analysis tool on our free tech tools for local businesses page.
We’ve all received a free USB at some point in our lives, whether that’s at school, a conferencing event or trade show and typically we will think nothing of them. But did you know that something as simple as a USB can cause a huge breach? Hackers will go as far to gain access to a computer by booting it from a USB device that contains malicious code…
Although there are certain precautions that your organisation can take to prevent this from happening. You will want to have a check to make sure that your firmware protection covers two areas. These include the Trusted Platform Module (TPM) and Unified Extensible Firmware Interface (UEFI) Security.
The Trusted Platform Module is resistant to physical tampering and tampering via malware. It will consider if the boot process is occurring properly and will take a look at any behaviour that appears completely out of the ordinary. You should also want to find devices that allow you to disable USB boots.
As a business protocol, you should seek to update any security solutions, but specifically endpoint security solutions in order to maximise your endpoint protection. If you can, you should definitely seek to automate these software updates, so they aren’t left by accident.
Not only should you be considering software updates, but you’ll also want to be regularly updating Firmware, which may be harder to remember as you aren’t given reminders. However, updating Firmware should not be forgotten, it is just as important to keeping your devices as secure as possible.
When users access your network, business apps and data, how are you authenticating their access? Just using a username and password simply will not cut it anymore, and if you do this then you will be at a high risk of a data breach.
The two typical methods of authentication are contextual authentication and a zero-trust approach. Let us explain the difference between these…
A contextual approach takes MFA just that one step further, it takes a look at context-cues for security policies and authentication. This can be a range of things including what device or network someone is logging in from, the time of day and the type of device they are using.
Whereas a zero-trust approach is a continuous monitor of your network. It makes sure that every entity in a network belongs there. It is a security framework where all users, inside or outside of the organisations are authenticated, authorised, and continually validated for security configuration. You approve all devices for access to your network and block all others by default.
Security protocols should always be in place with your device, from the time a device is first purchased through to the time it retires. There are tools out there that will help you to automate including Microsoft AutoPilot and SEMM. Across each stage of a device’s lifecycle (including onboarding, device authentication and registration, device monitoring/diagnostics, software updates and maintenance and device offboarding) security practices should be implemented. Having these implemented throughout the entirety of the lifecycle will ensure that a company doesn’t miss any critical steps.
A key stage where you will want to make sure you have maximum security is when a device is first issued to a user. When a device moves from one user to another, it needs to be properly cleared of data and you should ensure that any unnecessary privileges are removed. On the flip side when you retire a device, you need to make sure that it is properly scrubbed which means deleting all information and disconnecting it from any accounts.
An unfortunate inevitability is that mobile devices can get lost or stolen. Your Suffolk business needs to be prepared for in the event this happens. You should have a series of events that take place immediately subsequent to protect these devices data from being breached.
Backup solutions should be in place in preparation for potential device loss and you will want to make sure that your endpoint security allows wipe for devices and remote lock.
If you’re looking for some support with your endpoint protection strategy in order to ensure that your business and its data is protected, then we can help you! Get in touch with us today by sending an email to info@corbel.co.uk or giving us a call on 01473 241515.
Corbel Solutions Ltd are a Ipswich based IT Support partner who work throughout Ipswich, Felixstowe and Woodbridge and the surrounding Suffolk area. Providing various services from Business IT Support and solutions, Cyber Security and IT Consultancy services. If you would like some more information, then feel free to give us a call on 01473 241515 to discuss or email us on info@corbel.co.uk.
Previous post
Next post